c:\hsz36wuxj79q8\obj\Re\ease\ppZ.pdb
Static task
static1
General
-
Target
Solara.exe
-
Size
278KB
-
MD5
e6ee570e4a96ccd19ca97d0e7d85dd3c
-
SHA1
9faa35a4184f227fb116ce3d6e71b80d15a669e4
-
SHA256
21861808d8b7988c0216c2516f5d8f1830f919ebae247ceb35f92b93286ed426
-
SHA512
1f161a940d1a2e98ae3b50d04e61fbd5d60c32273eab4f6097c10e713f474e82d2de2e5aa5e60f28f27a62068d9fb2482cf57db4a0b2d8a0baa6a10912ebd4f1
-
SSDEEP
6144:J23PvJ4c0mmd4BdqmAqytMONJry+tl7O3lHGgs:JyPvJzhBdqii1NJrBtl76lHGgs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Solara.exe
Files
-
Solara.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 275KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ